Conference PaperPDF Available

Multiple security enhancements for image steganography

Authors:

Abstract

As the requirement for securing data has increased, novel approaches like reversible data hiding have been developed. Reversible data hiding is one among the many methods to securely store message into a cover media like image. Drawbacks of this method were overcome with the help of novel approaches like Separable reversible data hiding. Separable reversible data hiding is an improvised method in which there are two key players : the content owner and the data hider. The former encrypts the original image with an encryption key while the later exploits the spatial correlation of the natural image to create an additional space to accommodate data. At the receiver side, receiver having the data-hiding key, can extract the data but not the original image. At the same time, the receiver with the encryption key, can extract the image but not the data. If he has both the data-hiding and the encryption keys, he can extract the data and the original image content. The efficacy of this method can be enhanced if the keys too can be secured. This can be done using an efficient key-exchange algorithm like the Diffie-Hellman Key Exchange Algorithm. Also use of multiple encryption methods would make the system compatible with different applications. The system, in its working environment, would come across various actors with different privileges. In such a situation, having an authentication system would ensure that the data is received at the right hands. An authentication system and attack prevention measures, integrated along with the current version makes Separable Reversible data hiding a formidable method for data security.
Multiple Security Enhancements for
Image Steganography
Megha Mohan
Department of Computer Science and Engineering
Mar Baselios College of Engineering and Technology
Trivandrum, India
Email: meghamohan1992@gmail.com
AbstractAs the requirement for securing data has increased,
novel approaches like reversible data hiding have been
developed. Reversible data hiding is one among the many
methods to securely store message into a cover media like image.
Drawbacks of this method were overcome with the help of novel
approaches like Separable reversible data hiding.
Separable reversible data hiding is an improvised method in
which there are two key players : the content owner and the data
hider. The former encrypts the original image with an encryption
key while the later exploits the spatial correlation of the natural
image to create an additional space to accommodate data. At the
receiver side, receiver having the data-hiding key, can extract the
data but not the original image. At the same time, the receiver
with the encryption key, can extract the image but not the data. If
he has both the data-hiding and the e ncryption keys, he ca n
extract the data and the original image content.
The efficacy of this method can be enhanced if the keys too
can be secured. This can be done using an efficient key-exchange
algorithm like the Diffie-Hellman Key Exchange Algorithm. Also
use of multiple encryption methods would make the system
compatible with different applications. The system, in its working
environment, would come across various actors with different
privileges. In such a situation, having an authentication system
would ensure that the data is received at the right hands. An
authentication system and attack prevention measures,
integrated along with the current version makes Separable
Reversible data hiding a formidable method for data security.
KeywordsReversible data hiding, Separable reversible data
hiding, Symmetric keys, AES, DES, Diffie Hellman key exchange.
I. INTRODUCTION
The growth of data and its security are major research
areas under consideration in current scenario of
steganography. There is a tremendous growth in the size of
data being processed and also it is a tedious process for
handling them. There are various methods used for securing
the data which is transmitted through the shared medium. One
such method is hiding the data into a cover media. The cover
media may be of type text, image, audio or video. As the
requirement of securing data (image and text) has increased,
novel approaches like reversible data hiding have been
developed.
Reversible Data Hiding system is a non-separable method that
is, the user must have both the image encryption key as well as
Anitha Sandeep
Department of Computer Science and Engineering
Mar Baselios College of Engineering and Technology
Trivandrum, India
Email: anitha.sandeep@gmail.com
the data embedding keys to get the hidden data. This affects
the flexibility of the system [3]. In order to overcome
limitations of this system, a new system was proposed which
was both separable and reversible in nature.
Separable reversible data hiding is one in which there are two
key players, the content owner and the data hider [1]. The
former encrypts the original image with an encryption key
while the later exploits the spatial correlation of the natural
image to create an additional space to accommodate data. At
the receiver side, receiver having the data-hiding key, can
extract the data but not the original image. At the same time,
the receiver with the encryption key, can extract the image but
not the data. If he has both the data-hiding and the encryption
keys, he can extract the data and the original image [1]
content.
Separable reversible data hiding technique can be integrated
along with certain efficient encryption algorithms like DES
and AES for encrypting both the image as well as the data.
This further improves the strength of the system and makes
the system immune to eavesdroppings. Also use of multiple
encryption methods would make the system compatible with
different applications.
The efficacy of this method can be further enhanced if the
keys too can be secured. This can be done using a powerful
key-exchange algorithm like the Diffie-Hellman Key
Exchange Algorithm. The system, in its working environment,
would come across various actors with different privileges. In
such a situation, having an authentication system would ensure
that the data is received at the right hands. An authentication
system and attack prevention measures, integrated along with
the current version makes Separable Reversible data hiding a
formidable method for data security.
In the following sections, section
II gives a brief about
the existing Separable Reversible
Data Hiding Technique
is given. Followed by is section III in which the proposed
system i.e. the enhanced method of Separable Reversible Data
Hiding along with Secure Key Exchange is explained, then
section IV, dealing with Experimental results of the proposed
system. Finally is the conclusion which is disc ussed under
section V.
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
II. EXISTING SYSTEMS
A. Reversible data hiding
Reversible data hiding (Fig 1) is one among the many methods
used to securely exchange message by implanting a message
into some cover media provided and then sending it to the
destination. These methods are reversible in nature as the
original cover image can be recovered as such, after the
hidden message has been retrieved. The cover image used may
be an image that cannot tolerate any deformation, like
sensitive images - military images or remote sensing images or
medical images. At the destination, after extracting the hidden
message, the original cover image can be retrieved back
perfectly and hence this method is a reversible process[3].
Recently various types of reversible data hiding methods are
advised.
Advantages of this technique is that, the security of the
messege as well as the cover image is ensured. So another
improved method Separable reversible data hiding was
considered [5]. Though various novel changes have been made
in the reversible data hiding technique they have certain
drawbacks. One such drawback is non-separability i.e. both
keys are required to retrieve the embedded data as well as the
original cover image with desired resolution. Hence the
system was modified to overcome some of its drawbacks and
a novel system known as Separable Reversible Data Hiding
was introduced.
Fig. 1. Reversible data hiding [3]
B. Separable Reversible data hiding
The term separable means ’something that is possible to
separate’ [1]. In this concept, the separation of actions:
decryption of the actual cover image and retrieval of secret
(data which was embedded) takes place independent of each
other. The separation of actions is done based on keys
available (Fig 2).
At the destination, there are three different cases chanced
during extraction : (a) cover image only, (b) payload only, (c)
both payload and cover image [1].
Advantages of using this method is that, data and image can
Fig 2. Separable Reversible Data Hiding [1]
be separately recovered as this method is separable unlike
basic reversible data hiding. Also it is more efficient, more
flexible and secure than reversible data hiding. Disadvantage
is that, this method though efficient than reversible data
hiding, it do not consider about the security of the secret key
used in the encryption and embedding of data.
C. Separable Reversible data hiding using AES Algorithm
In this method, first the data is taken and is encrypted using
AES algorithm [2]. The image system would auto generate the
keys for encrypting the data as well as the image. The least
significant bits (LSB) of the encrypted image is compressed to
provide space for embedding the data. This is done using
Lossy compression technique.
Fig. 3. Separable reversible data hiding using AES algorithm[2]
At the receivers end, the encrypted image, containing the
encrypted data is obtained and is processed. If the receiver has
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
both the data encryption key as well as the data embedding
key, he can successfully extract the data but cannot get the
image (Fig 3).
If the receiver has the data embedding and the image
encryption key, he can retrieve an image similar to the original
one with accuracy of about 80 percent, but cannot get the
additional data [2]. If the receiver has all the three keys, i.e.
the image encryption key, the data encryption key as well as
the data embedding key, the receiver would be able to extract
the original data, additional data, and also recover the original
image similar to the original one. The various phases of this
technique are: Registration, Image encryption, Data
encryption, Data embedding, File sending, Image decryption,
Data extraction and decryption.
III. PROPOSED SYSTEM
As data hiding is an important activity in most of the
highly secure applications like military, remote sensing data
analysis and so on, it is important to identify a highly secure
method. The method must be simple in its architecture and the
algorithms used must be efficient and must satisfy the
requirements of such sensitive applications.
The proposed system is an integration of some of the basic
methods which were discussed in the previous section. For
simplicity, efficiency and flexibility, the Separable reversible
method can be used along with some aditional features.
The proposed system consists of the following phases:
A. Login
The actors of the system must register for every first time
they use the system. After that the can login using a login id
and a unique password. Every user must login into the system
before carrying out any activities. This is to ensure
authentication of genuine users of the system. User
authentication is the first measure taken for security.
To filter out mechanised login attacks, Captcha feature is
enabled. This is to ensure that the actor is a human and not a
robot or any other devices. This forms the next layer of
security.
Fig. 4. Block diagram of Proposed system
B. Image Encryption
In this phase the actor has to select a particular image as the
cover media for embedding the secret message into it. The
image may be one relevant to the message being transmitted
or may be an unwanted irrelevant image used just for the sake
of transmission.
The actor is provided with two algorithms, DES and AES.
Depending upon the application they may be chosen.
Application wich requires less security and complexity can opt
for DES, and one which require very high security for its
highly confidential data but can compromise on the
complexity of the system, can opt for AES algorithm. This
forms the next higher level of security based on the
confidentiality of the data being transmitted. For both the
cases an encryption key is necessary. The key required will be
automatically generated and the method used is explained in
phase D.
C. Data Encryption and Embedding
After encrypting the image, the next step is to encrypt the data
i.e. the secret message and then embedd it into the encrypted
image. Here also alternatives are provided by the interface to
choose among the encryption standards i.e. DES and AES.
After encryption, the data will be embedde into the previously
encrypted image using the LSB embedding technique. The key
required for encryption of data is also generated automatically
ny the system.
Hence a complex form of encrypted image with encrypted
data embedded on it has been obtained. This complex is then
send to the destination or the authorised receiver.
D. Key generation and Exchange
Key generation phase runs in the background of the other
phases explained above. In this phase, a Random key
generation technique is used and along with that, a Key
Fig. 5. Diffie-Hellman Key Exchange block diagram
exchange system has been integrated to make the system more
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
efficient and resistent to malicious attacks. Thus this phase
provides one among the multiple layers of security. The secure
key exchange method adopted is Diffie-Hellman Key
exchange method which is one of the simplest as well as
efficient method used for secure key exchange. Security is
also provided to ensure that the data is received at the right
hands. For this, the sender is provided with an alternative to
select the respective receiver of the message that he desire to
send. Only the selected actor or person would be able to
retrieve the data at the destination. Any other actor, even with
the respective keys would not be able to decrypt the data. The
authentication module was introduced to cover the drawback
of Diffie Hellman Key Exchange. Diffie Hellman Key
excahnge do not provide povisions to authenticate the actors
or to ensure that the data has been received by the right
person.
F. Data Extraction
At the receiver side, after the complex data has been obtained
in the right hands, the next step is to extract all the relevant
data from this complex. For this the receiver must have all the
keys i.e. the encryption keys as well as the data embedding
keys. In this phase, the receiver can extract data if he is an
authenticated user of the system, heis having the Data
extraction keys and also he is the mentioned receiver by t he
source. The data would be allowed to extract only if he is the
desired receiver of the data. If any other authorised user try to
access the data using the relevant keys, he would be denied
from doing this process.
The data can be extracted using reverse algorithms. For
extracting the encrypted data from the image, the reverse LSB
method is used. After that the encrypted data is extracted. If
the data was encrypted using DES algorithm, at the receiver
side, the system would be using reverse DES. Similar is the
case of AES algorithm. The extraction of the data can be done
either before or after decrypting the image. This is because the
basic system used is separable unlike Reversible Data Hiding.
G. Image Recovery
This phase can be executed before or after the data extraction.
The algorithms used is the respective reverse methods of one
used in the encryption process i.e. reverse DES or reverse
AES depending upon the one chosen by the encryptor.
This is the overview of how the system works and the
individual phases, in case of data transmission from source to
destination.
IV. EXPERIMENTAL RESULTS
Tests were carried out to check the efficacy of the system. The
results showed that the existing systems were less secure than
the proposed one in terms of the keys that they use for data
security. Also the proposed system has methods to prevent
some of the attacks which was absent in the previous system.
The system also provides user authentication system making
the new system a formidable method for data security. The
proposed system also provide flexibility of chosing algo-
rithms with different strengths, making the system application
friendly. AES algorithm used for encryption of data as well as
image is secure but complex in its architecture. So it can be
used as a tradeoff between complexity and efficiency of the
system.
The PSNR value of four sample images were calculated by
comparing their original image with their respective recreated
image. The values obtained were in the range of 30 to 50. This
implies that the recreated images are of acceptable quality.
Thus the system helps in recreating good quality image
effectively in terms of PSNR and hence it is an acceptable
method in the field of data security.
Table 1. . List of PSNR value of Sample Images
The above results shows that the novel method can be used
as an acceptable alternative for other basic data security
systems in terms of efficiency, flexibility and security.
V. CONCLUSION
Importance of securing data has lead to the development of
many models and systems. Using a method like Separable
reversible data hiding would make the security process more
efficient and would satisfy all the basic requirements of a data
securing system. Integrating this system along with a key
exchange technique like Diffe- Hellamn to secure the keys
used for encryption and embedding, would fix the system’s
flaws. Adding different security measures would provide with
an effective alternative in the field of data science.
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
REFERENCES
[1] Zhang, Xinpeng. ”Separable reversible data hiding in encrypted image.”
Information Forensics and Security, IEEE Transactions on 7.2 (2012):
826-832.
[2] Kadam, Parag, et al. ”Separable reversible encrypted data hiding in
encrypted image using AES Algorithm and Lossy technique.” Pattern
Recognition, Informatics and Mobile Engineering (PRIME), 2013 Inter-
national Conference on. IEEE, 2013.
[3] Zhang, Xinpeng. ”Reversible data hiding in encrypted image.” Signal
Processing Letters, IEEE 18.4 (2011): 255-258.
[4] Mithun Varghese and Teenu S Jhon. A Survey on Separable Reversible
Data Hiding in Encrypted Images. International Journal of Computer
Applications (0975 8887), Advanced Computing and Communication
Techniques for High Performance Applications, 2014.
[5] Jose, Rui, and Gincy Abraham. ”A separable reversible data hiding in
encrypt ed image with imp roved performan ce.” Emerging Research
Areas and 2013 International Conference on Microelectronics,
Communications and Renewable Energy (AICERA/ICMiCR), 2013
Annual International Conference on. IEEE, 2013.
[6] Bhatia, Ronak, et al. ”Separable Reversible Data Hiding In Encrypted
Image.” Imperial Journal of Interdisciplinary Research 2.6 (2016).
[7] Deshmukh, Punam, and Reema Patil. ”Separable Reversible Data Hiding
in Encrypted Image.”
[8] Khader, Aqeel Sahi, and David Lai. ”Preventing man-in-the-middle
attack in Diffie-Hellman key exchange protocol.” Telecommunications
(ICT), 2015 22nd International Conference on. IEEE, 2015.
[9] Anuradha, C., and S. Lavanya. ”Secure and Authenticated Reversible
Data Hiding in Encrypted Image.” International Journal of Advanced
Research in Computer Science and Software Engineering 3.4 (2013).
[10] Jagadeesan, J., et al. ”Reversible Data Hiding In Encrypted Images
Using AES Data Encryption Technique.”
[11] Agham, Vinit, and Tareek Pattewar. ”A novel approach towards sepa-
rable reversible data hiding technique.” Issues and Challenges in Intelli-
gent Computing Techniques (ICICT), 2014 International Conference on.
IEEE, 2014.
[12] Fujiyoshi, Masaaki. ”Separable reversible data hiding in encrypted
images with histogram permutation.” Multimedia and Expo Workshops
(ICMEW), 2013 IEEE International Conference on. IEEE, 2013.
[13] Tiwari, Anjali, Seema Rani Yadav, and N. K. Mittal. ”A review on
different image steganography techniques.” International Journal of
Engineering and Innovative Technology (IJEIT) Volume 3 (2014): 19-
23.
[14] http://www.cs.virginia.edu/evans/cs1120-f11/problem-sets/problem-
set-4-constructing-colossi.
[15] http://www.howtogeek.com/howto/33949/htg-explains-what-
is-encryption-and-how- does-it-work.
[16] https://en.wikipedia.org/wiki/Diffie
[17] https://technet.microsoft.com/en-us/library/cc962035.aspx
[18] http://all4ryou.blogspot.in/2012/11/network-securitycontd-part-2.html
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
Authorized licensed use limited to: R V College of Engineering. Downloaded on August 26,2021 at 09:45:03 UTC from IEEE Xplore. Restrictions apply.
ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
The acceleration in developments in communication technology has led to a consequent increase in the vulnerability of data due to penetration attacks. These attacks often came from outside where non-qualified companies develop IT projects. Cryptography can offer high levels of security but has recently shown vulnerabilities such as the man-in-the-middle (MITM) attack in areas of key exchange protocols, especially in the Diffie-Hellman (DH) protocol. Firstly, this paper presents an overview of MITM attacks targeted at the DH protocol then discusses some of the shortcomings of current defenses. A proposed method to secure DH, which helps secure systems against MITM attacks, is then presented. This method involves the use of Geffe generation of binary sequences. The use of Geffe generator offers high levels of randomness. Data hashed and encrypted using this proposed method will be so difficult to intercept and decrypt without the appropriate keys. This offers high levels of security and helps prevent MITM attacks.
Article
In order to achieve better performance, a reversible data hiding scheme for encrypted image was proposed based on image block grouping. Using this scheme, the original image of the content owner was encrypted by exploiting a stream cipher. When obtaining an encrypted image by the content owner, the encrypted image was divided into non-overlapping blocks by the data-hider, and the image blocks were grouped by the data hiding key. Subsequently, additional data was embedded into the encrypted image by modifying one of the image blocks in each group. With an encrypted image containing additional data, the receiver can readily gain decrypted version similar to the original image using the encryption key. Meanwhile, with the aid of spatial correlation in natural image, he or she can perfectly recover the original image and correctly extract additional data by comparing the smoothness of image blocks in each group. Experimented result shows that the proposed scheme can acquire a higher payload with good image quality. Furthermore, this scheme is suitable for practical application due to its simple operation and easy realization. © 2016, Editorial Department of Journal of Beijing University of Technology. All right reserved.
Article
To improve the performance of RDH (reversible data hiding) method in encrypted images, the embedding room was reserved before encryption and realizes the real separation of the data extraction from image decryption in operation. First, the feasibility of RDH in JPEG decompressed image blocks was researched. Then the theoretical probability of successful recovery of decompressed image blocks was calculated. Finally, a method of RDH in encrypted images was proposed and the main steps of the method include pretreatment, encryption, data embedding, data extraction and image recovery. The performance of the proposed method was compared with three existing RDH methods in encrypted images. The results demonstrate the proposed method has less error in image recovery, and for given embedding rates, the PSNR of decrypted image containing the embedded data are significantly improved. ©, 2015, Editorial Board of Journal on Communications. All right reserved.
Conference Paper
Internet is the most popular communication medium now a days but message communication over the internet is facing some problem such as data security, copyright control, data size capacity, authentication etc. There are so many research is progressing on the field like internet security, steganography, cryptography. When it is desired to send the confidential/important/secure data over an insecure and bandwidth-constrained channel it is customary to encrypt as well as compress the cover data and then embed the confidential/important/secure data into that cover data. This paper introduces the new way of originating the existing concept i.e. separable reversible data hiding. Actually the concept of separable reversible data hiding technique is based on steganography and related with internet security. The chief objectives of this literature is to work on the concept in which we used text as a hidden data, no plain spatial domain is used, attempt to increase the amount of data which is to be hide, evaluating quality by different interpretations. The principal notion of separable reversible data hiding is consist of three key procedures. First encrypt the cover media second hide the data and third get the data as well as cover media as per provisions.
Conference Paper
The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation.
Conference Paper
This work proposes a novel scheme to reversibly hide data into encrypted grayscale image in a separable manner. During the first phase, the content owner encrypts the image by permuting the pixels using the encryption key. The data hider then hides some data into the encrypted image by histogram modification based data hiding, making use of data hiding key. At the receiver side, if the receiver has only encryption key, he can generate an image similar to the original one, but cannot read the hidden data. Peak Signal to Noise Ratio (PSNR) of this decrypted image is much higher than the existing methods. If the receiver has only data hiding key, he can extract the data, but cannot read the content of the image. If the receiver has both keys, he may first extract the data using data hiding key and then decrypt the image using encryption key. The method also has a higher data hiding capacity than the existing reversible data hiding techniques in encrypted image.
Conference Paper
This paper proposes a new method of separable reversible data hiding (RDH) for encrypted images in which hidden data can be extracted from an encrypted image conveying hidden data without image decryption. By histogram and spatial permutation, the proposed method firstly encrypts an image and simultaneously prepares room for RDH. Data are, then, hidden into the encrypted image by a RDH scheme based on histogram modification, and the encrypted image with hidden data is sent to a receiver. According to keys which the receiver has, he/she is allowed to take seven different actions, whereas the conventional method offers only three. This feature of the proposed method extends applicable scenarios. Moreover, the proposed method always recovers the original image, whereas the conventional method sometimes fails to do. Experimental results show the effectiveness of the proposed method.
Article
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.
Article
This work proposes a novel reversible data hiding scheme for encrypted image. After encrypting the entire data of an uncompressed image by a stream cipher, the additional data can be embedded into the image by modifying a small proportion of encrypted data. With an encrypted image containing additional data, one may firstly decrypt it using the encryption key, and the decrypted version is similar to the original image. According to the data-hiding key, with the aid of spatial correlation in natural image, the embedded data can be successfully extracted and the original image can be perfectly recovered.
A Survey on Separable Reversible Data Hiding in Encrypted Images
  • Mithun Varghese
  • Teenu S Jhon
Mithun Varghese and Teenu S Jhon. A Survey on Separable Reversible Data Hiding in Encrypted Images. International Journal of Computer Applications (0975 8887), Advanced Computing and Communication Techniques for High Performance Applications, 2014.